Congressional Research Service Reports - 776 Matching Results

Search Results

U.S. Initiatives to Promote Global Internet Freedom: Issues, Policy, and Technology

Description: This report provides information regarding the role of U.S. and other foreign companies in facilitating Internet censorship by repressive regimes overseas. The report is divided into several sections: Examination of repressive policies in China and Iran, Relevant U.S. laws, U.S. policies to promote Internet freedom, Private sector initiatives, and Congressional action.
Date: April 5, 2010
Creator: Moloney Figliola, Patricia; Nakamura, Kennon H.; Addis, Casey L. & Lum, Thomas
Partner: UNT Libraries Government Documents Department

Information Warfare: The Role of Social Media in Conflict

Description: This report briefly discusses the use if social media as a tool of information warfare. The ability to rapidly disseminate graphic images and ideas to shape the public narrative transforms social media into a strategic weapon in the hands of terrorists, insurgent groups, or governments engaged in conflict.
Date: March 4, 2015
Creator: Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Advertising Industry in the Digital Age

Description: This report discusses regulatory challenges faced by policymakers as the advertising industry enters a period of far-reaching change brought about by the economic downturn and structural shifts as consumers move to the Internet and other digital platforms for news, entertainment, and socializing.
Date: November 9, 2009
Creator: Kirchhoff, Suzanne M.
Partner: UNT Libraries Government Documents Department

U.S. Semiconductor Manufacturing: Industry Trends, Global Competition, Federal Policy

Description: This report provides background information on the Zika virus, discusses challenges faced by governments and implementing partners in the Latin America and Caribbean region that are attempting to control the ongoing outbreak, and analyzes these above issues in the context of the U.S. Zika response.
Date: June 27, 2016
Creator: Platzer, Michaela D. & Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department

Treasury Issues White Paper on Fintech and Marketplace Lending

Description: This report briefly discusses the context and contents of a white paper issued on May 10, 2016 by the U.S. Department of the Treasury. The paper analyzes regulatory issues for the marketplace lending industry and offers several recommendations for industry and government responses.
Date: May 20, 2016
Creator: Murphy, Edward V.
Partner: UNT Libraries Government Documents Department

Telecommunications Discounts for Schools and Libraries: The “E-Rate” Program and Controversies

Description: This report addresses the controversial issues surrounding the E-rate program’s implementation and subsequent legislative measures introduced to address these issues. An additional issue, concern that minors may gain access to “inappropriate” material through the Internet has also had an impact on the E-rate program.
Date: July 28, 2005
Creator: Gilroy, Angele A.
Partner: UNT Libraries Government Documents Department

Information Services for Agriculture: The Role of Technology

Description: Significant improvements in technology-supported information services have created opportunities for their utilization by the farmers and ranchers of our Nation. This report highlights the development and expanded offering of these systems, describes current operational and experimental systems, and presents salient legislative initiatives which address this priority area.
Date: November 16, 1982
Creator: Chartrand, Robert L.; Carr, A. B. & Miller, Nancy
Partner: UNT Libraries Government Documents Department

Internet Tax Bills in the 105th Congress

Description: This report tracks the evolution and content of the Internet tax freedom bills. In general, the bills would impose a federal moratorium on the ability of state and local governments to impose taxes on certain aspects of the Internet and would establish a temporary federal commission to study selected issues and make policy recommendations.
Date: August 21, 1998
Creator: Noto, Nonna A.
Partner: UNT Libraries Government Documents Department

Computer Security: A Summary of Selected Federal Laws, Executive Orders, and Presidential Directives

Description: This report provides a short summary of selected federal laws, executive orders, and presidential directives, currently in force, that govern computer security. The report focuses on the major roles and responsibilities assigned various federal agencies in the area of computer security.
Date: April 16, 2004
Creator: Moteff, John D.
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: July 27, 2006
Creator: Seifert, Jeffrey W
Partner: UNT Libraries Government Documents Department

Data Mining and Homeland Security: An Overview

Description: Data mining has become one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. In the context of homeland security, data mining can be a potential means to identify terrorist activities, such as money transfers and communications, and to identify and track individual terrorists themselves, such as through travel and immigration records. This report explores the issue of data mining in detail and in the context of homeland security, as well as relevant initiatives and pieces of legislation.
Date: October 3, 2006
Creator: Seifert, Jeffrey W.
Partner: UNT Libraries Government Documents Department

Electronic Commerce: An Introduction

Description: Electronic commercial transactions over the Internet, or “e-commerce,” have grown so fast over the last five years that many experts continue to underestimate its growth and development. Whether retail business-to-customer or business-to-business transactions, e-commerce shows no signs of slowing down. In turn, policymakers both in the United States and abroad are likely to face increasingly complex issues of security, privacy, taxation, infrastructure development and other issues in 2000 and beyond. This report will be updated periodically.
Date: June 27, 2000
Creator: McLoughlin, Glenn J
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 21, 2003
Creator: Seifert, Jeffrey W
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: June 7, 2005
Creator: Seifert, Jeffrey W
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: June 7, 2005
Creator: Seifert, Jeffrey W
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: May 3, 2004
Creator: Seifert, Jeffrey W
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: December 16, 2004
Creator: Seifert, Jeffrey W
Partner: UNT Libraries Government Documents Department

Internet Privacy: Overview and Pending Legislation

Description: Internet privacy issues encompass concerns about the collection of personally identifiable information from visitors to Web sites, as well as debate over law enforcement or employer monitoring of electronic mail and Web usage. In the wake of the September 11 terrorist attacks, debate over the issue of law enforcement monitoring has intensified, with some advocating increased tools for law enforcement to track down terrorists, and others cautioning that fundamental tenets of democracy, such as privacy, not be endangered in that pursuit. This report provides a brief overview of Internet privacy issues and tracks pending legislation.
Date: November 13, 2001
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department